Data

GReAT tutors in your home

Kaspersky has expanded its portfolio of online training for cybersecurity professionals by launching a course geared around reverse engineering.

How to protect your corporate network this year: top three tips

The past year has presented challenge after challenge for corporate IT teams. Managing the forced office exodus caused by the pandemic was no small feat, and that was just the beginning, with the subsequent emergence of a plethora of security threats representing one of the biggest challenges to business continuity most organisations have ever encountered.

UK Business and Technology Conferences to look out for in 2021

The past year has decimated the events industry in the UK, costing it an estimated £2 billion over the course of the last 12 months or so. However, the UK remains on a tentative roadmap to end all lockdown restrictions by the end of June, increasing the chances that some events could be fully accessible...

Global Real-Time Payments Transactions Surge During Pandemic

More than 70.3 billion real-time payments transactions were processed globally in 2020, a surge of 41 percent compared to the previous year, as the COVID-19 pandemic dramatically accelerated trends away from cash and checks toward greater reliance on real-time and digital payments, a new global report from ACI Worldwide (NASDAQ: ACIW) and GlobalData reveals.

2021, the year the business automation gap is closed?

Most businesses would agree that Covid brought heavy process and cost implications along with it. And select British industries like hospitality have suffered substantial blows to their bottom line over the last 12 months. But is 2021, the year the business automation gap closed?

5 Top Data Loss Prevention (DLP) Best Practices

The 2021 Global Data Risk Report by Varonis revealed some interesting insights about why data loss happens. In the report, they found that, on average, 33 percent of the total number of folders used by companies is open to everyone.

Importance of AI in IoT Security

Cyber security is a highly volatile, changing landscape by its very definition. Ensuring efficient defensive posture requires continuous threat monitoring, developing defensive strategies to meet them, and implementing new countermeasures.

VoIP vs. UCaaS: The Main Differences

Companies have had to swiftly adapt to support a remote workforce since the emergence of COVID-19. With remote working poised to become the norm, IT and network managers are rethinking their technology roadmap. Many face choosing between VoIP and UCaaS solutions for their business communication needs.